Rfp Task 5

Improved Essays
Project Details

This scope of work document is targeted to allow the Supplier to provide a quote for a five year services proposal that is focused in the area of support for NERC CIP. The services described below will be quoted for the application to the cyber devices that exist in NextEra Power Plants that are subject to the NERC CIP Version 6 regulations. The Supplier will provide their rates for the execution of the services work described below and will provide a range of qualification levels that would be needed to execute each of the tasks described below as part of the Supplier response to the NextEra RFP. (11 Tasks)

TASK 1: PROJECT MANAGEMENT SUPPORT AND ADMINISTRATION

The Supplier will provide project management services for
…show more content…
Integrate schedules provided by the OEM project teams, as led by the appropriate NextEra PGD I&C Fleet Team Project Engineer; this includes the schedule from the DCS OEM’s.

2. Integrate schedules provided by the Physical Security project team, as led by the appropriate FPL Corporate Security (CS) Project Lead. This includes schedules from the contractor selected to implement the Physical Security Perimeter (PSP) installation, configuration and testing.

3. Integrate schedules provided by the Information Management (IM) project team, as led by the appropriate NextEra IM Project Manager. This includes schedules from IM and the cable installation vendor.

4. Integrate security upgrade project activities with the site outage schedule as provided by the NextEra PGD Central Maintenance team.

5. Review schedule with NextEra Project Director on a weekly basis, identifying critical path progress and any issues with tasks that are becoming or are late.

6. Work with NextEra Project Director and Project teams to develop and implement plans for remediation of any late tasks that impact overall schedule critical path.

7. Coordinate Requests for Information (RFI) between the different NextEra business
…show more content…
• Copies of relevant configuration, network and system topology documentation.

• Access to relevant internal and external systems as needed.

TASK 2: BES CYBER ASSET, BES CYBER SYSTEM, SECURE ARCHITECTURE DESIGN (CYBER)
& PHYSICAL SECURITY DRAWING

The Supplier will develop the NERC CIP project BCA List based upon the NextEra NERC CIPFPL CIP-002-6 procedures defining the NextEra BES Assets, the proposed Electronic Security Perimeter (ESP) design, the IM Corporate Controls Network design and the OEM system designs.

Developing the BCA List may include the following activities (as required):

1. Finalize the inventory of cyber assets associated with the NERC CIP Bright line and other Criteria
2. Review vendor supplied documentation
3. Conduct a final system review and walk through with qualified client representative
4. Create Engineering Analysis document, including NERC CIP low impact BES Cyber Systems

NextEra will provide a template for the BCA List in Excel format. The BCA List will contain information, including or similar to:

1. BES Cyber Asset Host Name
2. BES Cyber Asset Description
3. BES Cyber Asset Functional

Related Documents

  • Decent Essays

    Hrm/531 Week 2

    • 556 Words
    • 3 Pages

    Late payment of vendor invoices, which means late fees and lost cash discounts: The help with the new ERP Mal-Bal will be able to make payments to vendors in time for the system can integrate with the inventory purchased from the stores department. Late deliveries to customers: The old software integration of data is a problem and in order to make timely deliveries and the purchase order will be received by the marketing needs to be marked to material dispatch section in time. The lack of which will result in a delay of deliveries. Growth in inventories, accompanied by an increase in stockouts: Integration of data and lack of availability of information to employees will result in stock in hand not matching with the product demand and purchase department may…

    • 556 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    Firewall We are recommending that ABC Company uses the Cisco ASA with Fire Power Services. Firewalls are the protection between the network and the internet, and is a must in all locations. The Cisco ASA provides a multilayered threat protection that focuses on the next generation of threats, constantly updating to provide continuous protection (Cisco ASA, 2015). It also has advanced malware protection and industry leading network visibility (Cisco ASA, 2015).…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    (TCO C) A project to remodel an office area has the following activities. (Hint: You will need to build an AIB diagram, perform a forward pass, and perform a backward pass to answer this question.) ............... a) What are the critical path activities? (5 points) b) What is the project's scheduled completion time?…

    • 961 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    From physical security to device security applications our network will be protected against both internal and external threats. The above mentioned architecture will step data through a variety of security configurations which will methodically mitigate the top four possible security threats. Additional support from the ISP may also be required when confronting DOS attacks as may attempt to overload security appliances. This will be mitigated by our multiple ISP connection but we must include information about DOS attacks in our service agreement with the ISP. Our network will prove to be more secure than other WWTC branches and will most likely become the security standard across the…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    EXECUTIVE ORDER 13735 Executive Order 13735, “Providing an Order of Succession Within the Department of the Treasury,” was issued on August 12, 2016 by President Barrack Obama. This executive order lays out the order of succession should the Secretary of the Treasury be unable to perform his or her duties due to death, resignation, or is unable to fulfill their duties of the office. The Executive Order also describes the exceptions to the order.…

    • 445 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In the year 2008, the Comprehensive National Cybersecurity Initiative (CNCI) was formed and it was to ensure the US is able to defend itself from immediate threats should they occur and to be able to educate the government. The Building Blocks of a Computer Network The description of a building block of a network will be explained by the description of one from a shore command in the Navy. First one would need a computer…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    egaproject Paradox Issues in the O&M Phase of a Megaproject The occurrence of "The Megaproject Paradox" and issues associated with its occurrence, are not limited to the Execution Phase of a Megaproject's Life Cycle. In this article, an analysis of the impact of "The Megaproject Paradox" occurring in the Operations and Maintenance Phase of the Life Cycle of a complex Megaproject, the Australian National Electricity Market (NEM) is considered. It is recommended that Parts 1, 2.1 and 2.2 are preparatory reading to fully comprehend Part 2.3 (this article).…

    • 314 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    On September 21, 2015, Ms. Sophia Martinez approved the topic of researching and addressing the problem of mandating the purchase of an overpriced dining plan provided by Texas A&M University (TAMU) to students living on campus. To be in accordance with the dining services on campus, there are numerous innovative selections to accommodate the availability of dining options for students living on campus. Some of these options are in five different type of blocks ranging from 90 to 240 meal trades and about 300 to 500 dining dollars per semester. The price of dining options can range from $1,300 to $2,100 per semester not including tax.…

    • 844 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Overview of Border 2020 The Border 2020 project will effectively improve air quality, provide clean, safe drinking water to residents, reduce waste, and prepare both the U.S and Mexico for environmental response, and stewardship. The Border 2020 project was created under the La Paz (The Peace) agreement in 1983 . Building off the border 2012 project, the latest edition will break into a two year plan, conquering each goal. The E.P.A and SEMARNAT, as well as other local governments, encourage the community to be actively involved. Project responsibilities are broken down into 3 networks.…

    • 706 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Getronics continually maintains fixate on the cessation utilizer and provides clients with a cessation-to-end vision through orchestrating, design and implementation of infrastructure solutions. Getronics withal has vigorous project management capabilities across all areas of their portfolio. Their experienced teams provide full support to customers during intricate IT projects and…

    • 50 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Critical Infrastructure (CI) is very important because the nation relies on it to carry out its essential activities. Since there are many essential activities that must be carry out at all times across the nation, CI has been divided into 16 different CI sectors (Department of Homeland Security, 2017). While each sector is different and perform different functions, all CI sectors are interdependent. That means that each CI sector relies on the functions of other CI sector(s) in order to be able to carry out their functions. That is why all CI Sectors are equally important because the disruption of one CI sector could also lead to the disruption of another or multiple CI sectors.…

    • 573 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Defining Homeland Security Homeland security (HLS) is an expansive enterprise that includes many agencies and departments at all levels of government. As such, it has been defined in many different but similar ways. For example, in their book Understanding Homeland Security, Noftsinger, Newbold, and Wheeler (2007) define homeland security as “a concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, minimize the damage, and recover from attacks that do occur” (pp. 29-30). In its 2010 Quadreannial Homeland Security Review Report, the Department of Homeland Security (DHS) similarly defined HLS as “a concerted national effort to ensure a homeland that is safe, secure, and…

    • 1218 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    DESIGN A decision has been reached by individual(s) with responsibility to effect change in order for an organisation to remain competitive and flourish. Plan. In order to start the process a proposal (business case) needs to be produced. This would identify the issues that need to be addressed, cost implications, who should be directly involved with the project and the potential outcome and benefits.…

    • 737 Words
    • 3 Pages
    Improved Essays